Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Saturday, July 31, 2010

GPS Locators for Your Children

Not knowing where your children are and worrying about what bad places they may be is a constant companion to parents.

Being able to locate your children using GPS technology is a great peace of mind provider. Being able to see their real-time locations on interactive satellite maps from any PC or web-enabled mobile phone will just push the right buttons with most parents.

Home Security and Personal Protection recently tested the Sprint Family Locator (SFL) program. Going to a website, logging in then choosing a phone to geo-locate then seeing a satellitle imagery map with your child's location (or really your child's cell phone's location) worked quite well. We knew the exact location of the child (phone) and each time the SFL depicted the phone to within a few feet of the actual location.

A couple times, there was a delay where we were asked, through a popup box to try again in 60 seconds, but 60 seconds later we were able to geo-locate to the child (cell phone) location.

If you child carries a cell phone, this is the way to go as it is well affordable and easy technology to master.


Sprint offers a 15 day free trial. Regular cost is $5 per month per phone. There is unlimited use. Geo-locate your children, set Safety Checks and send text messages to your children from within SPrint Family Locator. Peace of mind for your entire family.

Go to the SFL site and view the demonstration or watch the video below,...both are different so we suggest viewing both.


Friday, July 30, 2010

Facebook Personal Profiles Leaked



Leaked: 100 million personal profiles on Facebook out in public

If you have not checked your Facebook profile setting, here is another wake up call. About 100 million Facebook users’ personal data, web profile address where posted on web for anyone and everyone to access. Personal details posted on profile Facebook profile pages were found on public file sharing service The Pirate Bay.

According to news reporting, those individuals whose Facebook Profile setting is set to be available for public search where the only profiles affected. This latest incident shows that one should BE CAREFUL with the information they share on social and public websites on internet.

The issue is not only restricted to Facebook, if you have profiles and are active on different social networking websites, such as Hi5, Twitter, MySpace etc.. Make sure that you thoroughly check your profile settings and profile information.

Here are some Facebook safety tips:

* Use Friend Lists to create a personal group of friends, you personally know and trust.
* Facebook Privacy Setting page, remove your personal information from showing up in Facebook public search.
* From Facebook Privacy Setting page, remove your profile from appearing in Google and other search engine search results. Under “Public Search Listing”, remove the check mark next to “Create a public search listing for me and submit it for search engine indexing” and save.
* Protect your photos, albums and share only with the people in with your friend list.
* Prevent you post and stories from showing up in your friend’s news feeds.
* Set your contact details to private.

Thursday, July 29, 2010

ATM Security Problems

Cracking the vault: ATMs spill their guts in new computer attacks

an article by Jordan Robertson, Wednesday July 28, 2010,

LAS VEGAS (AP) -- A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

The attacks demonstrated Wednesday targeted standalone ATMs. But they could potentially be used against the ATMs operated by mainstream banks.

Criminals have long known that ATMs aren't tamperproof.

There are many types of attacks in use today, ranging from sophisticated to foolhardy: installing fake card readers to steal card numbers, hiding tiny surveillance cameras to capture PIN codes, covering the dispensing slot to intercept money and even hauling the ATMs away with trucks in hopes of cracking them open later.

Computer hacker Barnaby Jack spent two years tinkering in his Silicon Valley apartment with ATMs he bought online. These were standalone machines, the type seen in front of convenience stores, rather than the ones in bank branches.

His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines.

He showed off his results here at the Black Hat conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.

His attacks have wide implications because they affect multiple types of ATMs and exploit weaknesses in software and security measures that are used throughout the industry.

His talk was one of the conference's most widely anticipated, as it had been pulled a year ago over concerns that fixes for the ATMs wouldn't be in place in time. He used the extra year to craft more dangerous attacks.

Jack, who works as director of security research for Seattle-based IOActive Inc., showed in a theatrical demonstration two ways he can get ATMs to spit out money:

-- Jack found that the physical keys that came with his machines were the same for all ATMs of that type made by that manufacturer. He figured this out by ordering three ATMs from different manufacturers for a few thousand dollars each. Then he compared the keys he got to pictures of other keys, found on the Internet.

He used his key to unlock a compartment in the ATM that had standard USB slots. He then inserted a program he had written into one of them, commanding the ATM to dump its vaults.

-- Jack also hacked into ATMs by exploiting weaknesses in the way ATM makers communicate with the machines over the Internet. Jack said the problem is that outsiders are permitted to bypass the need for a password. He didn't go into much more detail because he said the goal of his talk "isn't to teach everybody how to hack ATMs. It's to raise the issue and have ATM manufacturers be proactive about implementing fixes."

The remote style of attack is more dangerous because an attacker doesn't need to open up the ATMs.

It allows an attacker to gain full control of the ATMs. Besides ordering it to spit out money, attackers can silently harvest account data from anyone who uses the machines. It also affects more than just the standalone ATMs vulnerable to the physical attack; the method could potentially be used against the kinds of ATMs used by mainstream banks.

Jack said he didn't think he'd be able to break the ATMs when he first started probing them.

"My reaction was, 'this is the game-over vulnerability right here,'" he said of the remote hack. "Every ATM I've looked at, I've been able to find a flaw in. It's a scary thing."

Kurt Baumgartner, a senior security researcher with antivirus software maker Kaspersky Lab, called the demonstration a "thrill" to watch and said it is important to improving the security of machines that can each hold tens of thousands of dollars in cash. However, he said he doesn't think it will result in widespread attacks because banks don't use the standalone systems and Jack didn't release his attack code.

Jack wouldn't identify the ATM makers. He put stickers over the ATM makers' names on the two machines used in his demonstration. But the audience, which burst into applause when he made the machines spit out money, could see from the screen prompts on the ATM that one of the machines was made by Tranax Technologies Inc., based in Hayward, Calif. Tranax did not immediately respond to e-mail messages from The Associated Press.

Triton Systems, of Long Beach , Miss. , confirmed that one of its ATMs was used in the demonstration. It said Jack alerted the company to the problems and that Triton now has a software update in place that prevents unauthorized software from running on its ATMs.

Bob Douglas, Triton's vice president of engineering, said customers can buy ATMs with unique keys but generally don't, preferring to have a master key for cost and convenience.

"Imagine if you have an estate of several thousand ATMs and you want to access 20 or so of them in one day," he wrote in an e-mail to the AP. "It would be a logistical nightmare to have all the right keys at just the right place at just the right time."

Other ATM manufacturers contacted by the AP also did not immediately respond to messages.

Jack said the manufacturers whose machines he studied are deploying software fixes for both vulnerabilities, but added that the prevalence of remote-management software broadly opens up ATMs to hacker attacks.